Local Tree Hunting Scheme to Find the Closest Content in In

6 Information-Centric Networking
Local Tree Hunting Scheme to Find the Closest
Content in In-Network Cache
Hiroshi SHIMIZU and Masahiro JIBIKI
CCN/ICN with in-network cache capability has been expected as Future Internet. This paper
proposes a novel content discovery scheme called Local Tree Hunting for cached contents. It
provides almost the same hunting performance as the entire hunting although the hunting area
is localized into a tree whose root is the node with caching history. As an option, when caching
the state is notified to neighbor nodes to make a short-cut of request forwarding. The effectiveness
of the proposed scheme is verified with computer simulation with a Zipf’s law content popularity
distribution and the Least Recently Used eviction model.
1Introduction
In the Future Internet, networks with various information processing functions, such as computation and storage
functions, have been expected recently, while networks
hitherto were mainly designed as a means for transmission of information. Above all, the Information Centric
Network (ICN) in which intermediate nodes cache content
is in the spotlight[1]-[5]. Content was downloaded from web
servers in conventional networks, but now with ICN, it will
be downloaded from a caching node near the user, thereby
reducing the response time and the transmission links (hop
count). Consequently, the issue of how to find desired
content from the in-network caches is more important in
ICN than how to transmit the content. At present, the IP
address of the web server storing the content is resolved
from the content name (for example, the URL address) in
the Domain Name Server (DNS). However, with ICN, since
the contents are widely disseminated to network nodes so
as to be dynamically cached and evicted, it becomes difficult to manage the content location centrally by the DNS.
In view of this situation, this paper aims to propose
a scheme to hunt and find the requested content without
central management. The client, who does not know the
content location, requests the content using the content
name instead of the location address such as IP address,
and the network guides the request to the caching node
of the content. Here, in order to obtain a shorter response
time and fewer transmission links, it is necessary to find
the caching node closer to the request node.
[2][5]
The Content Centric Network (CCN) is a prospective
ICN architecture, and its characteristics are explained with
the help of Fig. 1. The most significant characteristic is that
the network nodes have content caching functions, and find
the closest caching node using the request signal named
Interest with the content name. User R1 sends a request
signal. The request signal is forwarded to the web server
along the name base path (solid black line) which is the
path identified by the content name. Content downloaded
from the web server is forwarded in the opposite direction from the path taken by the Interest (dashed black
line) and cached in intermediate nodes A, B, and C. The
content name which has a prefix structure similar to an
IP address enables specifying the path. Next, when User
R2 requests the same content, the Interest is forwarded
to the closest caching node B along the name base path
(solid red line) whose endpoint is User R2 and node B
is the download source of the content (dashed red line).
Unlike the conventional download scheme from the web
FFig. 1 CCN scheme
139
6 Information-Centric Networking
server, a shorter forwarding path is obtained. However,
this scheme includes the problem that the closest caching
node is not always hunted. On the other hand, the scheme
of flooding request signals to find the closest caching
node is also being studied[6], but it has a major problem
that overhead caused by exhaustive hunting increases.
This paper proposes a hunting scheme called Local Tree
Hunting (LTH), which rivals full hunting even though the
hunting area is partial, that is to say, a distributed hunting
scheme is used to find the closest caching node in a local
tree, and verifies its effectiveness by computer simulation.
In Section 2, the conventional content hunting scheme
is described, in Section 3, the proposed LTH scheme is
explained in detail, in Section 4, the access protocol for
hunting is explained, and in Section 5, the comparative
schemes are described and the performance is compared
and evaluated by computer simulation so as to verify the
effectiveness of the proposed scheme.
2 Conventional CCN/ICN schemes
The typical conventional schemes to be compared in
CCN/ICN are explained here.
1) CCN scheme (Fig. 2 (a))[2]: The request signal sent from
node R is terminated in the closest caching node C
(default response node) on the name base path. And
then, following the opposite path from node C, the
content is downloaded to node R. The hunting area of
the request signal from the caching node is limited to
the name base path, thereby minimizing the overhead
for hunting. However, as shown in the figure, the closest
caching node is not always present on the name base
path. For example, caching nodes 1 and 2 which are
the closest from node C, are not found.
2) Breadcrumb scheme (Fig. 2 (b))[7]: Breadcrumbs[8] are
left showing the history of the path used for forwarding the content in the past, and a request signal is
transmitted according to the Breadcrumbs. If node A
has a history of storing and forwarding the content in
the past, then even after the content is evicted, such
history is recorded as a Breadcrumb. In the case of this
figure, the request signal from node R is forwarded in
the direction of node 1, following the Breadcrumb of
node A. The Breadcrumb is overwritten so as to record
the most recent trail. Although this scheme presumes
that the caching node near the node containing the
Breadcrumb is closer to the request node than the
[7]
default response node (Node C on the name base path
in this case), it is not guaranteed that the caching node
discovered with Breadcrumbs is closer than the default
response node C.
3) Flooding scheme (Fig. 2 (c))[6]: The request signal is
flooded to all the neighbor nodes, and this operation
is repeated until reaching a caching node. The caching
nodes send the response signals to the request node,
and then the request node checks the response signals.
After identifying the closest node among them, the
request node instructs to download. Although the
content is exhaustively hunted beyond the name base
path, the closest node with the shortest path is found,
but the hunting overhead is large.
3 Local Tree Hunting (LTH) scheme
The proposed LTH scheme is for finding the sufficiently closest caching node without hunting exhaustively
by utilizing the general behavior that the cached content
dissemination area expands as time elapses. The basic and
optional schemes are explained in reference to Figs. 3
and 4[8][9].
3.1 Basic scheme
The LTH scheme is classified into LTH (S) and LTH (M).
First, the LTH (S) scheme shown in Fig. 3 (a) will be
explained. The request node R sends the request including
the content name to the name base path leading to the
web server in the same way as the CCN scheme shown in
Fig. 2 (a). This request signal is relayed by a node which
FFig. 2 Conventional scheme
140 Journal of the National Institute of Information and Communications Technology Vol. 62 No. 2 (2015)
6-4 Local Tree Hunting Scheme to Find the Closest Cached Content
FFig. 3 Local Tree Hunting basic scheme
3) The response signal and content download are forwarded through the shortest path, using the location
FFig. 4 Neighbor notification control
is not caching the content. The first caching node (default
response node) responds to the request, and sends the response signal to request node R in reply. At the same time,
this request signal is branch-cast to all the paths present
in the forwarding history in the Local Tree whose root
is the default response node. This branch-casting node is
called the Fork node. The caching node which received the
request sends the response signal to request node R. The
node in which the requested content was evicted forwards
the request according to the history. After selecting the
response signal with the smallest hop count among those
received, request node R sends the acknowledgment to the
sender caching node. In this way, the caching node closest
to the request node is found among the response nodes.
There are the following three differences from the CCN
scheme.
1) The Fork node branch-casts the request signals to the
paths based on the forwarding history for the Local
Tree.
2)Based on the response signals from the caching
nodes which received the request signal, the request
node selects the closest.
address of the request node such as IP address.
Next, the LTH (M) scheme will be explained using
Fig. 3 (b). The caching node (default response node) which
is the closest to the request node on the name base path,
responds in the same way as LTH (S). The difference lies
in the following. While only the closest caching node can
be the Fork node on the name base path in the LTH (S)
scheme, the LTH (M) scheme allows the closest node with
the caching history to be the Fork node even though it
does not cache. The Fork node operation to activate the
branch-casting is the same as LTH (S).
Compared to LTH (S), since LTH (M) activates the
branch-cast from a node nearer the request node, the Local
Tree’s size, that is, the hunting area, is smaller. Generally, a
wider hunting area allows for a closer caching node to be
found. Hence, according to the order of the hunting area
breadth, the hunting ability becomes higher. That is, the
order of hunting capacity would be Flooding first, then
LTH (S), LTH (M), and finally CCN.
3.2 Optional control
Neighbor notification control[10] shown in Fig. 4 is
added to enhance the hunting capacity. Node X which
newly caches the content notifies this state to the neighbor
nodes. When receiving the request signal, node A which
has already received the notification from node X forwards
it to node X instead of forwarding to node B along the
name base path. With this, because the request signal is
sent to the node which is sure to cache the content, the
download path can be short-cut. Node X works as the
Fork node and activates the branch-cast. Since neighbor
141
6 Information-Centric Networking
notification control itself causes a new hunting overhead,
two options are considered,
1) NN (AL): The request node and intermediate nodes
perform the neighbor notification,
2)NN (RQ): Only the request node performs the
neighbor notification in order to reduce the hunting
overhead.
4 Access protocol
The LTH protocol consists of the four phases shown in
Fig. 5 (a) (Content Request, Response, Acknowledgment,
and Content Download). Each phase is identified from the
Type field present in the frame header shown in Fig. 5 (b).
In each node, a node ID is allocated which indicates the
location. Request node R generates the Content Label,
which is temporarily mapped to the content name (for example, the URL address). The requested content is uniquely
defined by a set of Content Label and request node ID[11].
Although a similar operation was studied in ICN/SDN, the
Content Labels were centrally managed[12], whereas in this
scheme, each node manages them in a distributed manner.
The access protocol shown in Fig. 5 is classified into
four phases and explained below.
1) Content Request: Request signal is branch-casted in
the Local Tree, whose root is the Fork node (F). Each
node checks the history and controls the forwarding
based on the Content Name.
2) Response: Caching nodes in the Local Tree (Fork
node and response nodes 1, 2, and 3) send the
response signals using the request node ID as the
destination address. The response signal is forwarded
FFig. 5 Access flow and frame header
through the shortest path given by the request node
ID.
3) Acknowledgment: The request node checks the hop
count of each response signal from the caching node,
and replies with acknowledgment through the input
port which received the response signal with the
smallest count. This acknowledgment is forwarded in
the opposite direction of the response signal travelling path, and the caching node which receives it first
becomes the download source.
4)Content Download: The content is downloaded
through the shortest path given by the request node
ID and cached in the intermediate nodes.
The characteristics of this access protocol are listed
below.
1) Content name is mainly used in the request signal
phase.
2) Content Label used for the content download can be
managed locally by each node.
3) Content forwarding control is implemented by the
set of Content Label + node ID.
5 Performance evaluation with computer
simulation
5.1 Evaluation items and evaluation objects
The objective of this research is to find the caching
node closest to the request node. In order to verify the
effectiveness of the proposed schemes, the download hop
count from the discovered caching node, and the hunting
overhead which is the sum of the request signal forwarding
hop count and the neighbor notification hop count, were
evaluated.
The six LTH related schemes of LTH (S) and LTH (M)
with no neighbor notification control, LTH (S) + NN (AL),
LTH (S) + NN (RQ), LTH (M) + NN (AL), and LTH (M)
FFig. 6 Multiple Breadcrumbs scheme
142 Journal of the National Institute of Information and Communications Technology Vol. 62 No. 2 (2015)
6-4 Local Tree Hunting Scheme to Find the Closest Cached Content
+ NN (RQ) which add neighbor notification control (NN),
were examined. These six schemes were compared with the
CCN scheme and Flooding scheme shown in Fig. 2, and
the Multiple Breadcrumbs scheme shown in Fig. 6. In the
regular Breadcrumb scheme shown in Fig. 2 (b), only node
A controls the Breadcrumbs. In contrast, in this Multiple
Breadcrumbs scheme, the Breadcrumbs are controlled by
multiple nodes A and B on the name base path which have
the cache history. In addition to the Breadcrumbs operation, the request signal is also forwarded to node C (default
response node) which is caching the content. This Multiple
Breadcrumbs scheme has more hunting capacity than the
regular Breadcrumb scheme.
5.2 Simulation models
Figure 7 shows the network model and the evaluation
criteria. The network was studied as a future optical network[13]in Japan, in which two nodes were located in Tokyo,
and one node each in other prefectures. The web server
was installed in node S (Tokyo). Forty-seven other nodes
besides node S randomly sent request signals 10,000 times
each, and the 12,800-types content catalog was distributed
in accordance with the Zipf rule.
㹮L Lσே
௞ୀଵሺͳȀሻ
where N= Content Catalog Size
(Occurrence probability is proportional to the reciprocal of the content ranking order)[14].
The buffer size of each node was 32, 64, 128, 256 and
512. When the buffer was full, the content was evicted in
accordance with the Least Recently Used (LRU) policy.
Figure 8 shows the accumulated probability in the Zipf
rule, in which the first ranking occupies 10% of all requests
and the requests until the 85th ranking occupy 50%.
node on the horizontal x-axis is shown in Fig. 9. When
the request node was already caching the content, the
download hop count and the hunting hop count were
assumed to be zero. Figure 9 (a) shows the download hop
count between the hunted caching node and the request
node. The performance of the CCN scheme was the
worst, followed by the LTH (M) scheme, then Multiple
Breadcrumbs (MPLBCR). The Flooding scheme was the
best for discovering the closest caching node. Figure 9 (b)
indicates the relative download hop count values of each
scheme, normalized by that of the Flooding scheme.
LTH (M) + NN (AL), LTH (M) + NN (RQ), and LTH (S)
schemes achieved almost the same performance. The best is
the LTH (S) + NN (AL) and LTH (S) + NN (RQ) schemes
with almost the same performances.
On the other hand, Fig. 9 (c) shows the evaluation
result of the hunting hop count, which indicates the
hunting overhead, given by the sum of request signal
forwarding hop count and the neighbor notification hop
count. The CCN and LTH (M) schemes had the fewest,
followed by the LTH (M) + NN (RQ) scheme, then the
Multiple Breadcrumbs scheme. As for the LTH (M) +
NN (RQ) scheme in comparison with the Flooding scheme,
the hunting overhead could be remarkably reduced to 1/15th
to 1/10th allowing only a 5‒10% performance degradation
in the download hop count. On the other hand, while the
LTH (S) + NN (RQ) scheme required the 2.5 times the
hunting overhead compared to the LTH (M) +NN (RQ)
scheme, the improvement factor of the download hop
count was merely 4%. Therefore, the LTH (M) + NN (RQ)
scheme would be best as the scheme to find the closest
caching node while suppressing the hunting overhead.
Next, we evaluated the performance behavior for content ranking order. The 12,800 different types of contents
were divided into 10 groups based on the distribution
5.3 Simulation result
The simulation result with these buffer sizes of each
FFig. 7 Network model and specifications
FFig. 8 Request signal probability distribution by Zipf rule
143
6 Information-Centric Networking
FFig. 9 Performance evaluation result
FFig. 10 Performance evaluation result (buffer size = 128)
shown in Fig. 8, so that the content group request probability for each group would be almost 10%. The first group
(Group1) composed of only the first ranking content had
10% probability. And then the next groups of contents
2-4, 5-11, 12-31, 32-85, 86-231, 232-631, 632-1,720, and
1,721-4,693 rankings having 10% probability respectively
were made into Group 2, 3, etc. The 10th group (Group
10) was comprised of content ranked at 4,694 and below.
Figure 10 shows the performances in buffer size 128. As
shown in Fig. 10 (a), the download hop count performance
did not differ greatly depending on the hunting schemes
in the first three and the last three ranking groups. In the
situation where the higher ranking contents were widely
disseminated and the low ranking cached contents were
largely evicted in a short time, there was not so much
difference among these schemes. In terms of the LTH
(M) + NN (RQ) and LTH (S) + NN (RQ) schemes, the
download hop count performances were almost the same
for the higher ranking groups 1 to 5 which occupy 50% of
the total requests.
The recommended LTH (M) + NN (RQ) scheme is
summarized below.
1) Out of the nodes containing the cache history, the
Fork node (which is the first to receive the request
144 Journal of the National Institute of Information and Communications Technology Vol. 62 No. 2 (2015)
6-4 Local Tree Hunting Scheme to Find the Closest Cached Content
signal including the content name on the name base
path) branch-casts the request signal to the Local
Tree whose root is itself, based on the cache history.
The caching node, which received the request signal
by the branch-casting, sends the response signal to
the request node through the shortest path.
2) When the Fork node is not caching, the request
signal is forwarded until it reaches the first caching
node on the name base path and this node (default
response node) also sends the response signal.
3) The request node notifies all the neighbor nodes
about the caching state when it was downloaded
(neighbor notification).
4) In phase 1), the intermediate node that received the
neighbor notification forwards the request signal to
this neighbor node (short-cut). The neighbor node
works as the Fork node.
5) The request node, which received the response signals
from the caching nodes on the Local Tree including
the default response node, checks the hop count of
these response signals, and sends the acknowledgment to the response node which has the smallest
hop count.
6)The response signal and downloaded contents travel
through the shortest path specified with the node ID
involved in the content name to the request node.
6Conclusion
Dr. NISHINAGA and the colleagues of the New Generation
Network Laboratory.
References
1 http://www.named-data.org/ndn-proj.pdf, “Named Data Networking (NDN)
Project,” NDN-0001, Oct. 31, 2010.
2 Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass,
Nicholas H. Briggs, and Rebecca L. Braynard, “Networking Named Content,”
Proc. of CoNEXT 2009, pp.1–12, Dec. 2009.
3 Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher,
and Borje Ohlman, “A Survey of Information-Centric Networking,” IEEE
Communications Magazine, pp.27–36, July 2012.
4 Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba,
and Bertrand Mathieu, “A Survey of Naming and Routing in InformationCentric Networks,” IEEE Communications Magazine, pp.44–53, Dec. 2012.
5 H.S. Jeon, I.S. Choi, B.J. Lee, and H.Y. Song, “A Closer Look at Content-Centric
Internet Research Projects,” ICACT2012, , pp.698–702, Feb. 2012.
6 Sen Wang, Jun Bi, Jianping Wu, Zhaogeng Li, Wei Zhang, and Xu Yang, “Could
In-Network Caching Benefit Information-Centric Networking?” AINTEC '11
Proc. of the 7th Asian Internet Engineering Conference, pp.112–115, 2011.
7 Elisha J. Rosensweig and Jim Kurose, “Breadcrumbs: efficient, besteffort content
location in cache networks,” Proc. of IEEE INFOCOM 2009, pp.2631–2635,
2009.
8 H. Shimizu, H. Asaeda, M. Jibiki, and N. Nishinaga, “Content Hunting for
In-Network Cache: Design and Performance Analysis,” Proc. of IEEE ICC 2014,
pp.3178–3183, June 2014.
9 H. Shimizu, H. Asaeda, M. Jibiki, and N. Nishinaga, “Local Tree Hunting:
Finding Closest Contents from In-Network Cache,” IEICE TRANS. INF.&
SYST.,Vol.E98-D,No.3, pp.557–564, March 2015.
10 Lijun Dong, Dan Zhang, Yanyong Zhang, and Dipankar Raychaudhur, “Optimal
Caching with Content Broadcast in Cache-and-Forward Networks,” Proc. of
IEEE ICC 2011, pp.1–5, June 2011.
11 H. Shimizu, H. Asaeda, M. Jibiki, and N. Nishinaga, “Service Expansible
LabelFlow/SDN and Information Centric Operation,” IEICE Technical Report
IN2013-55, pp.113–118, July 2013.
12 S. Salsano, N. Blefari-Melazzi, A. Detti, G. Morabito, and L. Veltri, “Information
As for the scheme to efficiently hunt and find the
caching node closest to the request node while suppressing
the hunting overhead in the Information Centric Network
with in-network caching operation, the Local Tree Hunting
scheme with several options was proposed. By computer
simulation, the most effective scheme was selected among
the options. The location address of the request node was
used in the signal frame header information for acquiring
the shortest download path.
The problem still remains that the lower ranking contents cause a large amount of hunting overhead although
they do not benefit from the caching so much due to the
eviction as shown in Fig. 8 (c). We are going to advance
the study to resolve this problem.
centric networking over SDN and OpenFlow: Architectural aspects and
experiments on the OFELIA testbed,” Computer Networks, Vol.57, Issue 16,
pp.3207–3221, Nov. 2013.
13 T. Sakano, Y. Tsukishima, H. Hasegawa, T. Tsuritani, Y. Hirota, S. Arakawa,
and H. Tode, “A Study on a Photonic Network Model based on the Regional
Characteristics of Japan,” IEICE Technical Report PN2013-1, pp.1–6, June 21,
2013.
14 L. Breslau, Pei Cao, Li Fan, G.Phillips, and S.Shenker, “Web Caching and Zipflike Distributions: Evidence and Implications,” Proc. of the 18th Annual Joint
Conference of the IEEE Computer and Communications Societies, INFOCOM
'99, Vol.1, pp.126–134.
Hiroshi SHIMIZU, Ph.D.
Researcher, New Generation Network
Laboratory, Network Research Headquaters
New Generation Network, Information
Centric Network, SDN
Acknowledgments
We deeply appreciate the guidance from Dr.
Masayuki MURATA, Professor at Osaka University, and
145
6 Information-Centric Networking
Masahiro JIBIKI, Ph.D.
Research Expert, New Generation Network
Laboratory, Network Research Headquaters
New Generation Network, Information Centric
Network, Very Large-scale Information
Sharing Network
146 Journal of the National Institute of Information and Communications Technology Vol. 62 No. 2 (2015)